Fail2ban | 最简单的防止SSH暴力破解的脚本

 by   FunctionClub Shell Version: v1.0 License: GPL-3.0

kandi X-RAY | Fail2ban Summary

kandi X-RAY | Fail2ban Summary

Fail2ban is a Shell library. Fail2ban has no bugs, it has a Strong Copyleft License and it has low support. However Fail2ban has 7 vulnerabilities. You can download it from GitHub.

最简单的防止SSH暴力破解的脚本
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              Fail2ban has a low active ecosystem.
              It has 225 star(s) with 152 fork(s). There are 8 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 1 open issues and 1 have been closed. On average issues are closed in 25 days. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of Fail2ban is v1.0

            kandi-Quality Quality

              Fail2ban has no bugs reported.

            kandi-Security Security

              Fail2ban has 7 vulnerability issues reported (0 critical, 2 high, 5 medium, 0 low).

            kandi-License License

              Fail2ban is licensed under the GPL-3.0 License. This license is Strong Copyleft.
              Strong Copyleft licenses enforce sharing, and you can use them when creating open source projects.

            kandi-Reuse Reuse

              Fail2ban releases are available to install and integrate.
              Installation instructions are not available. Examples and code snippets are available.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Fail2ban
            Get all kandi verified functions for this library.

            Fail2ban Key Features

            No Key Features are available at this moment for Fail2ban.

            Fail2ban Examples and Code Snippets

            No Code Snippets are available at this moment for Fail2ban.

            Community Discussions

            QUESTION

            Unable to match sendmail "Connection rate limit exceeded" with fail2ban
            Asked 2021-Apr-20 at 16:21

            I can't manage to find the error preventing fail2ban to match these lines:

            ...

            ANSWER

            Answered 2021-Apr-20 at 16:21

            The second message (did not issue MAIL/EXPN/VRFY/ETRN) can be found if you would set mode aggressive by sendmail-reject jail (after this fix, e. g. v.0.10.6 and 0.11.2).

            There was indeed no exact rule for the first message (rate limit exceeded) matching this kind of message exactly, due to different handling on the arguments, but...
            I fixed this now in f0214b3 on github.

            Unless not released you can extend it by yourselves either in filter (copy & paste from github filter) or directly in jail:

            Source https://stackoverflow.com/questions/67167703

            QUESTION

            How can we block X-Fordward-For header IP (https request) with IPtables
            Asked 2021-Apr-20 at 15:34

            Basic Overview
            We are trying to set up Rate Limiting on our server. we are using Nginx as a webserver and fail2ban for blocking IPs with Iptables. IPtables can block IPs if a request hits direct our Nginx server(in this case $remote_addr is client IP).

            But if it comes via some proxy server then proxy server passes client IP in X-Fordwarded-For header and Iptables unable to detect that(in this case $remote_addr is proxy server IP).

            Is their some other ways we can block X-Fordwarded-For header IP?
            any help will be appreciable

            IPtable IP block commmand - iptables -A INPUT -s 111.112.212.112 -j DROP

            ...

            ANSWER

            Answered 2021-Apr-20 at 15:34

            You can not do that using iptables (especially if the packets are encrypted due to https traffic).

            But if you use fail2ban and nginx, you can try the action nginx-block-map. Just use variable $http_x_forwarded_for in the map (see action description) and provide it in log, fail2ban will monitor, so the filter would be able to capture it as an ID to ban.

            Source https://stackoverflow.com/questions/67134322

            QUESTION

            Purpose of backslash in nginx map configuration
            Asked 2021-Apr-06 at 07:07

            I'm using a map configuration to block IP addresses with nginx + fail2ban

            The sample configuration genrator code in fail2ban repo looks like this :

            ...

            ANSWER

            Answered 2021-Apr-06 at 07:07

            From the manual page:

            If a source value matches one of the names of special parameters described below, it should be prefixed with the “\” symbol.

            So it's unnecessary (but harmless) for values such as 127.0.0.1, but it defends against using hostnames such as default, hostnames, volatile or include, which are considered "special parameters" within the map block.

            Source https://stackoverflow.com/questions/66964010

            QUESTION

            Fail2ban regex doesn't match (no sense!)
            Asked 2021-Apr-05 at 13:23

            Here's a log:

            ...

            ANSWER

            Answered 2021-Apr-05 at 13:23

            Correct, it won't wiork due to catastrophic backtracking.

            You need to

            • Replace all \[.*] with \[[^][]*]
            • In case there can be more than one space between [...], use + or \s+ instead of literal spaces.

            You can use something like

            Source https://stackoverflow.com/questions/66952463

            QUESTION

            How to get unique IP (and number of banned times) from fail2ban logs
            Asked 2021-Apr-03 at 00:24

            I have a lot banned IP from fail2ban log. This have this format:

            ...

            ANSWER

            Answered 2021-Apr-03 at 00:24

            Assuming all the lines of the log follow the same template as those three, with no extra spaces anywhere:

            Source https://stackoverflow.com/questions/66925872

            QUESTION

            fail2ban - how to ban ip permanently after it was baned 3 times temporarily
            Asked 2021-Mar-03 at 15:22

            Have set up fail2ban service on CentOS 8 by this tutorial: https://www.cyberciti.biz/faq/how-to-protect-ssh-with-fail2ban-on-centos-8/.

            I have set up settings similiarly according to tutorial above like this:

            ...

            ANSWER

            Answered 2021-Mar-03 at 15:22

            A persistent banning is not advisable - it simply unnecessarily overloads your net-filter subsystem (as well as fail2ban)... It is enough to have a long ban.

            If you use v.0.11, you can use bantime increment feature, your config may looks like in this answer - https://github.com/fail2ban/fail2ban/discussions/2952#discussioncomment-414693

            Source https://stackoverflow.com/questions/66392687

            QUESTION

            run fail2ban in kubernetes?
            Asked 2021-Mar-01 at 22:12

            My Situation at the moment: I'm setting up a mail server and just after getting it to work, the logs are flooded with authentication failed messages from an suspicious iran network trying to login to random accounts.

            After some googeling I found out that fail2ban can stop those attacks, but there's one problem: how to use fail2ban in kubernetes? My Ideas:

            • I found this plugin for traefik, but it requres the traefik instance to be connected to thei SaaS managment service, what I don't need
            • Installing fail2ban on the host: As kubernetes connects multiole nodes, fail2ban on node 1 only gets the logs from this node and cannot block traffik coming in on node 2.

            Is there a solution to run fail2ban In kubernetes, maybe linked to the ingress controller, as it is possible with traefik, but without any connection to a SaaS provider?

            ...

            ANSWER

            Answered 2021-Mar-01 at 22:12

            There isn't really a good way to do this. Both on the log access front, and more importantly on tweaking the iptables rules from inside a container. You could definitely use the core engine of fail2ban to build a tool around the k8s native APIs (pods/logs, NetworkPolicy) however I don't know any such project at time of writing.

            Source https://stackoverflow.com/questions/66430186

            QUESTION

            Is fail2ban slowing my system or iptables?
            Asked 2021-Jan-19 at 08:21

            I have a server (VPS) with the following services:

            • email server (postfix/dovecot)
            • dns server (bind9)
            • http server (nginx)

            Fail2ban creates a lot of entries in iptables and this causes the server to become very slow and even sometimes it becomes unreachable and I have to login via the console and flush iptables before I can connect to the server. The used jails are shown below:

            • Jail list: dovecot, named-refused, nginx-botsearch, nginx-http-auth, nginx-limit-req, php-url-fopen, postfix, postfix-auth, recidive

            95% of bans are triggered by postfix jail. I reduced iptables size by setting recidive jail with : bantime = 7200 findtime = 3600 maxretry = 5 , the system slowness slightly improved but still not enough. My question : - is fail2ban to blame for this slowness? or iptables itself? In a previous project, I had no fail2ban installed and I used iptables with many entries (more entries than what my actual fail2ban creates) and the system was fast.

            I appreciate any advice on how can I deal with this fail2ban issue.

            ...

            ANSWER

            Answered 2021-Jan-19 at 08:21

            Both of them are to blame. Fail2Ban monitors your logs - so if there is a lot of logging, Fail2Ban will have to parse more text. IPtables performs linear search over the list of rules - it is not possible to use binary search as this will break the logic. So the more rules - the slower IPtables will be.

            You should check the usedns and banaction settings in /etc/fail2ban/jail.conf. DNS queries may be slow and you may want to try iptables-ipset-proto4 instead of iptables-multiport as an action.

            Source https://stackoverflow.com/questions/65786514

            QUESTION

            fail2ban does not match date pattern
            Asked 2021-Jan-02 at 17:01

            I am trying to debug my fail2ban filter and some weird error with respect to my custom datepattern and stumbled upon this documentation. According to that the output of the command fail2ban-regex "2013-09-19 02:46:12 1.2.3.4" "" should show something like:

            ...

            ANSWER

            Answered 2021-Jan-02 at 16:46

            That won't work on my system either, which means that fail2ban apparently doesn't recognize that date format.

            It will recognize that same date in different format though, for example:

            Source https://stackoverflow.com/questions/65540197

            QUESTION

            Traefik: all subdirectories return 404
            Asked 2020-Dec-23 at 03:58

            First, thank you in advance for taking a look. I think I have a very basic mistake somewhere, but I have searched for hours with no result. I am trying to run a proof of concept to expose a container behind a traefik 2.4 reverse proxy at a subdirectory. My DDNS does not allow for subdomains, so I am stuck with subdirectories until I can prove this works.

            My problem is every container I stand up is dynamically picked up by traefik and shows up in the dashboard, but the subdirectory gives a 404 error. I have even used PathPrefix with a regex to prevent the ending / error.

            Here is my configuration.

            Traefik's docker-compose:

            ...

            ANSWER

            Answered 2020-Dec-23 at 03:58

            For future googlers

            Alright, I figured it out tonight. Thank you, reddit.com/traefik user /u/Quafeinum for trying to help! I actually read the guide here: https://spad.uk/practical-configuration-of-traefik-as-a-reverse-proxy-for-docker/ by spad on linuxserver.io which helped me understand the labels better. The crux of the problem was

            Source https://stackoverflow.com/questions/65398369

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install Fail2ban

            You can download it from GitHub.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/FunctionClub/Fail2ban.git

          • CLI

            gh repo clone FunctionClub/Fail2ban

          • sshUrl

            git@github.com:FunctionClub/Fail2ban.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Consider Popular Shell Libraries

            awesome

            by sindresorhus

            ohmyzsh

            by ohmyzsh

            realworld

            by gothinkster

            nvm

            by nvm-sh

            papers-we-love

            by papers-we-love

            Try Top Libraries by FunctionClub

            V2ray.Fun

            by FunctionClubCSS

            SSR-Bash-Python

            by FunctionClubCSS

            MTProxy-Bash

            by FunctionClubShell

            YankeeBBR

            by FunctionClubShell

            uPing

            by FunctionClubPython